Polycrate: Deployment Automation for Kubernetes and Cloud Migration
TL;DR Polycrate is an Ansible-based framework for deployment automation that containerizes all …
Diese Serie erklärt systematisch, wie moderne Software compliant entwickelt und betrieben wird – von EU-Regulierungen bis zur technischen Umsetzung.
Today, those responsible for infrastructure and application operations face dual pressures: Teams must quickly and flexibly roll out new services, while regulatory, data protection, and internal governance requirements are increasing.
This is where a CNCF-compliant, European Kubernetes Distribution comes in. It provides:
The ayedo Kubernetes Distribution is deliberately lean but consistently curated. It forms the technical basis of the ayedo platform and can also be operated independently if you “only” need a solid, sovereign Kubernetes foundation.
Both variants of the distribution follow the same goal: Production-ready, CNCF-compliant Kubernetes with clearly defined operational processes – once in European public clouds, once in your own data center or on enterprise infrastructure.
With Loopback, you operate Kubernetes clusters on European cloud providers and major hyperscalers (in European regions) without getting caught up in proprietary managed Kubernetes dialects.
Key features:
This means for you: You leverage the elasticity and ecosystem of the public cloud while maintaining technical control in a standardized Kubernetes world. A later switch of providers or a transition to an on-premises variant is thus realistically plannable.
The second variant of the distribution is based on k3s, a lightweight, CNCF-certified Kubernetes distribution from SUSE. It is optimized for:
Key characteristics:
Both variants – Loopback and k3s – follow the same concepts and API standards. This reduces cognitive load in your teams and creates real portability: Policies, CI/CD pipelines, and deployment manifests work in both worlds with minimal adjustments.
CNCF compliance is more than a label: It is a technical assurance that certain interfaces, behaviors, and compatibilities are adhered to. For you as a responsible party, this results in three key advantages.
Standardized Kubernetes APIs enable the migration of workloads between different environments:
This portability is not just a technical convenience but a governance issue: You create a robust exit strategy and strengthen your negotiating position with individual providers.
A unified, CNCF-compliant foundation allows security and compliance concepts to be developed cleanly once and then reused: Policies, network segmentation, observability standards, and backup strategies become reusable building blocks.
In combination with policy engines like Kyverno (more on that shortly), you can:
Especially in the context of compliance in regulated industries, this reusability is a significant efficiency lever.
CNCF compliance also means: The ecosystem around Kubernetes – from the ingress controller to the service mesh – functions as expected. You can rely on a wide range of open-source and enterprise tools without having to maintain special solutions for proprietary platforms.
Technical portability is only half the battle. The second pillar of the ayedo Kubernetes Distribution is EU sovereignty – understood as a combination of infrastructure location, data flows, and governance processes.
The distribution can be operated in European data centers, particularly in:
This makes it significantly easier to address requirements from GDPR, BDSG, and country-specific regulatory authorities. You maintain control over:
In conjunction with our Cloud-Sovereignty-Framework, this creates a structured model that aligns technical architecture, operational processes, and legal requirements.
Sovereignty is not a retrofitted “feature” in the ayedo Distribution but a design principle:
For you as a responsible party, this means: You can not only promise sovereignty but also technically substantiate it.
Beyond the mere Kubernetes cluster, the ayedo Kubernetes Distribution brings a curated selection of platform services that are practically always needed in modern environments. These components are chosen to seamlessly integrate into a compliance-oriented operational model.
Cilium acts as a CNI (Container Network Interface) and offers:
Especially in segmented, regulated environments, the ability to isolate services logically rather than just by IP is a crucial security gain. Cilium supports you in gradually implementing zero-trust architectures practically.
VictoriaMetrics and VictoriaLogs together form the backbone for:
For audits and internal compliance requirements, it is essential that:
The distribution integrates these building blocks so that observability is not seen as an afterthought project but as an inherent part of the platform.
Harbor is an enterprise-capable container registry and a central element of the software supply chain in the distribution:
This lays the foundation for technically anchoring requirements from supply chain regulation and internal security policies: Only verified, signed images make it into production.
Keycloak acts as a central identity provider:
In combination with Kubernetes RBAC, you define:
Kyverno is a policy engine specifically developed for Kubernetes. In the distribution, it serves as a central building block for governance and compliance:
TL;DR Polycrate is an Ansible-based framework for deployment automation that containerizes all …
TL;DR Guardrails are automated guidelines around your deployments: They prevent typical …
TL;DR GitOps describes an approach where Git serves as the central, versioned source for the desired …